Computer Science ›› 2013, Vol. 40 ›› Issue (6): 103-107.

Previous Articles     Next Articles

Trusted Computing-enabled DRM System and its Security Protocols

WANG Jian,ZHANG Zhi-yong,YU Wei-hua and YANG Li-jun   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Digital rights management is designed to protect digital content usage from end to end.While,the hidden security problems in client system threaten the reasonable usage of digital contents.Through researching on trusted computing technology,a common architecture of DRM combined with trusted computing was presented.Especially,the application of trusted computing in license distributing and digital content usage was introduced.Then,an identity authentication and key agreement protocol for trusted DRM were designed,and also described with its security analysis.Through the protocol,license server can authenticate the DRM client and validate its integrity.Otherwise,the peer can obtain sharing key to protect the digital license distributing.

Key words: Digital rights management,Trusted computing,Remote attestation,SKAE,Authentication protocol

[1] Rosenblatt W,Trippe W,Mooney S.Digital Rights Management:Business and Technology[M].New York:M&T Books,2002
[2] 俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1966
[3] 张志勇,牛丹梅.数字版权管理中数字权利使用控制研究进展[J].计算机科学,2011,38(4):48-54
[4] Stamm S,Sheppsrd N P.Implementing trusted terminals with a TPM and SIDDRM[C]∥Proceedings of REM 2007.2007:73-85
[5] Sadighi A R,Wolf M.Christisn stuble enabling fairer rights management with trusted computing[C]∥Proceedings of ISC 2007.2007:53-70
[6] 邱罡,王玉磊,周利华.基于可信计算的DRM互操作研究[J].计算机科学,2009,6(1):77-80
[7] Gallery E.Authorisation Issues for Mobile Code in Mobile Systems[D].London:Royal Holloway,University of London,2007
[8] Grawrock D.TCG Specification Architecture Overview Revision 1.4[EB/OL].https://www.trusted computinggroup.org/groups/TCG_1.4_Archiecture_Overview.pdf,2011-05-01
[9] Sailer R,Jaeger T,Zhang Xiao-lan,et al.Attestation-based Policy Enforcement for Remote Access[C]∥Proceedings of the 11th ACM conference on Computer and communications security,CCS’04.2004:308-317
[10] TCG Infrastructure Workgroup.Subject Key Attestation Evi-dence Extension Specification Version1.0[EB/OL].http://www.trustedcomputinggroup.org/specs/IWG/IWG_SKAE_Extension_1-00.pdf,2005-06-16
[11] Housley R,Polk W,Ford W,et al.Internet X.509Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile (RFC 3280)[Z].Internet Engineering Task Force,Network Working Group,2002

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!